Sciweavers

3115 search results - page 148 / 623
» Synthesizing Secure Protocols
Sort
View
PKC
2000
Springer
84views Cryptology» more  PKC 2000»
15 years 1 months ago
Forward Secrecy and Its Application to Future Mobile Communications Security
Abstract. Perfect forward secrecy, one of the possible security features provided by key establishment protocols, concerns dependency of a session key upon long-term secret keys (s...
DongGook Park, Colin Boyd, Sang-Jae Moon
ISSTA
2006
ACM
15 years 4 months ago
Towards self-adaptive service-oriented architectures
Web services, service-oriented, and service-discovery architectures help developers solve complex business cases, reduce costs, risks, and time-to-market. The task of developers i...
Giovanni Denaro, Mauro Pezzè, Davide Tosi, ...
PODC
2004
ACM
15 years 3 months ago
On the design of distributed protocols from differential equations
We propose a framework to translate certain subclasses of differential equation systems into distributed protocols that are practical. The synthesized protocols are state machine...
Indranil Gupta
CCS
2008
ACM
14 years 12 months ago
A fast real-time memory authentication protocol
We propose a new real-time authentication scheme for memory. As in previous proposals the scheme uses a Merkle tree to guarantee dynamic protection of memory. We use the universal...
Yin Hu, Ghaith Hammouri, Berk Sunar
MOBIQUITOUS
2005
IEEE
15 years 3 months ago
SRDP: Securing Route Discovery in DSR
Routing is a critical function in multi-hop mobile ad hoc networks (MANETs). A number of MANET-oriented routing protocols have been proposed, of which DSR is widely considered bot...
Jihye Kim, Gene Tsudik